Full Disclosure mailing list archives
Re: Twitter URL spoofing still exploitable
From: dave bl <db.pub.mail () gmail com>
Date: Wed, 28 Sep 2011 01:11:04 +1000
On 28 September 2011 01:00, Mario Vilas <mvilas () gmail com> wrote:
On Tue, Sep 27, 2011 at 3:26 PM, Dan Kaminsky <dan () doxpara com> wrote:Ok, now nobody can spoof a URL, but how come a user will tell good URLs and bad ones apart? Oh boy!Wherever did you get the idea that users can do this?Jokes apart, I do find it annoying that URLs aren't expanded automatically anymore. But I don't expect this situation to be permanent.
Agreed. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Twitter URL spoofing still exploitable Pablo Ximenes (Sep 26)
- Re: Twitter URL spoofing still exploitable Darren Martyn (Sep 27)
- Re: Twitter URL spoofing still exploitable Pablo Ximenes (Sep 27)
- Re: Twitter URL spoofing still exploitable Dan Kaminsky (Sep 27)
- Re: Twitter URL spoofing still exploitable Mario Vilas (Sep 27)
- Re: Twitter URL spoofing still exploitable dave bl (Sep 27)
- Re: Twitter URL spoofing still exploitable Benji (Sep 27)
- Re: Twitter URL spoofing still exploitable Pablo Ximenes (Sep 27)
- Re: Twitter URL spoofing still exploitable Pablo Ximenes (Sep 27)
- Re: Twitter URL spoofing still exploitable Darren Martyn (Sep 27)